Outline
RFID and Applications
What is it? How is it used? RFID applications
RFID Privacy
RFID Tags
Radio Frequency IDentification (RFID) Each tag has a unique ID. Anyone can read the ID through radio connection.
EZ Pass
SpeedPass
Mobile phone
Plastic #3
74AB8
5F8KJ3
Type
Passive
Passive
915 MHz
15 feet
Alien
Passive
915 MHz
17 feet
The maximum free space read range of these emulator tags is 5 meters, consistent with the performance of other known UHF passive tags. Read range depends on reader configuration and tag enclosure.30 W EIRP (USA site licensed):> 20m 4 W EIRP (USA unlicensed): 6-8m500 mW ERP (Europe): 1-2m The first product to come from the collaboration will be a handheld device that reads Matrics' passive EPC tagsThe unit will be able to read passive tags from up to 33 feet (10 meters) away
iPico
Passive
915 MHz
Matrics/Savi
Passive
unspecified
33 feet
Provides pointer to database entry for every object, i.e., unique, detailed history
Some applications
Better supply-chain visibility -- #1 compelling application
U.S. DHS: Passports U.S. FDA: Pharmaceuticals, anti-counterfeiting Libraries Housepets approx. 50 million
Parenting logistics
Water-park with tracking bracelet
Embedded in plastic
In answer to a questionabout
Michael [Okoroafor, in charge of technical solutions for Coca-Cola] replied with a resounding YES! - IDTechEx Magazine 2003
"With these things you could literally tag a pack of chewing gum. - Jacobsen, Alien Technology
Key applications
Supply chain and logistics Production control Asset management Brand protection Automotive immobilization, gas & toll payments (near field) Livestock tracking Public transport and room access Library management Retail
Increase shoppers experience
Consumer benefits
Saves lives e.g. tire safety Helps commuters on public transport Reduces road congestion Improves shopping experience Authenticates brands and prevents fraud Can prevent, deter and help solve theft of high-value goods All chips meet international standards such as ISO-15693, ISO 18000 and AIDCs EPC
Commercial applications
Smoother inventory tracking
Military supply logistics
Gulf War I: Placement of double orders to ensure arrival Gulf War II: RFID renders supply chain much more reliable
Procter & Gamble: Elimination of dock bottleneck -fast loading of pallets onto trucks Product recalls Anti-counterfeiting Maintaining shelf stocks in retail environments Gillette Mach3 razor blades Parenting logistics Water park uses RFID bracelets to track children
London Transport
One of the largest roll-outs of contactless smart cards worldwide Fare collection across Londons entire underground train and bus networks A major step towards an integrated transport network for London 3 million cards during the first year of operation using Philips MIFARE technology
Wal-Mart requiring top 100 suppliers to start deploying RFID in 2005 Other retailers and DoD following Wal-Mart lead Pallet and case tagging first -- item-level retail tagging seems years away Estimated costs
2005: $0.05 per tag; hundreds of dollars per reader 2008: $0.01 per tag; several dollars per reader (?)
RF system variables
1. 2. 3. 4. 5. Choice of operating frequency Tag IC, tag antenna design Reader, reader antenna design Proximate materials Sources of external interference
Tag anatomy
Substrate Die attach Tag IC
Antenna
74AB8
5F8KJ3
Reader anatomy
Digital Signal Processor (DSP)
Network Processor
Power Supply
915MHz Radio
13.56MHz Radio
RFID-Reader
Messaging-Server
Application Server
DB-Server
Other devices
?
Connector External Information System
Vision
The RFID System Architecture is a highly complex system! RFID solution merges the virtual world of data with the real world of RFID-tagged assets
antenna reader
Smart Tag (RFID)/ Smart Product ID ID ID memory memory memory sensors sensors sensors unit processing processing unit processing unit communication communication communication interfaces interfaces interfaces RFID Antenna/ RFID Antenna/ RFID Antenna/ Reader Reader Reader receiver (read) receiver (read) receiver (read) transmitter transmitter transmitter (write) (write) (write)
application server
comm.
Internet
comm.
Middleware comm. mgt., data mgt., event mgt. basic services: identification, notification, moniitoring, tracking
Applications Applications Applications and Services and Services and Services ERP ERP ERP CRM CRM CRM SCM SCM SCM Ebusiness Ebusiness Ebusiness web services web services web services
Problems
How is it possible to ensure system quality and reliability? Design of RFID System Architecture
System Architecture, Integration of back-end and data capture
How is it possible to achieve an accurate virtual mapping of reality? Especially important in real-time systems Derivation of process performance figures At least starting point process improvements
?
Information Systems
The market for RFID system integration is far greater than the number of experienced RFID system integrators out there. [METAGroup 03]
Organizational Support
Supporting processes Key Performance Indicators Involves operations experts, quality manager, IT, vendors, customers, trading partners, technology partners, operational staff Hardware deployment e.g. of huge quantities Tagged object management Software such as middleware, data applications Data security Risk of failure System reliability Facility management
Reporting-Client
RFID-Reader
Firewall
Technical Support
@
Connector Messaging-Server Application-Server DB-Server Web-Server
Other devices
?
Connector External Information System
RFID technologies
Standardization and industrial associations:
ISO, AIM (Association for Automatic Identification and Data Capture Technologies)
Applicability:
Originally destined to electrical labelling, tracking and access applications Applications with ultra short-range non-symmetrical communication between a reader (master) and a transponder (slave) Applications with very low cost and power consumption (even passive devices) Applications with a usage model called physical browsing
Technical features:
Many different commercial solutions based on several ISM bands, current mainstreams 125 kHz and 13.56 MHz Passive / active transponders Communication rate up to several hundreds of kilobits per second Communication range from a few millimeters to several tens of centimeters
Vision Summary
RFID solution merges the virtual world of data with the real world of RFIDtagged assets
by providing accurate, real-world, real-time data and information solution enables companies to close the loop between capturing data converting data to meaningful information and automating all associated transactions and processes businesses will create smarter, more responsive and more adaptive business processes to execute adaptive supply chain networks
RFID Privacy
RFID System
Radio Frequency IDentification (RFID)
Each tag has a unique ID. Anyone can read the ID through radio connection.
VERY USEFUL FOR GOODS FLOW CONTROL
Our Concern
What if the tag is linked to your identity? What if someone is tracing the tag?
PRIVACY VIOLATION (BIG BROTHER PROBLEM)
Consumers
Adversary
ID tracing
Monitor tag owners activity.
Adversary
www.rapturechrist.com/666.htm
The mark is a microchip assembly which will be implanted under the skin of the right hand. Later on, the mark will be implanted under the forehead, so people who have no right hand could also have the mark. The microchip assembly, called radio frequency identification (RFID) is already used in animals. In dogs, the RFID is placed between the shoulder blades, and in birds it is implanted under the wing. Now there is a one for humans called VeriChip.
www.spychips.com, www.stoprfid.com
Unlike a bar code, [an RFID tag] can be read from a distance, right through your clothes, wallet, backpack or purse -- without your knowledge or consent -- by anybody with the right reader device. In a way, it gives strangers x-ray vision powers to spy on you, to identify both you and the things you're wearing and carrying.
We can deploy security protocols on physical channels not just logical ones External, higher-capability devices can help protect tags
Pseudonym rotation
Set of pseudonyms known only by trusted verifier Pseudonyms stored on tag
Limited storage means at most, e.g., 10 pseudonyms
74AB8
=
Strengthening the approach
Strengthen restriction on adversarial queries using throttling
Tag enforces pattern of query delays via, e.g., capacitordischarge timing
MMW91
Pseudonym refresh
Trusted reader provides new pseudonyms Pseudonyms must be protected against eavesdropping and tampering using encryption, but tags cannot do standard cryptography! Can load up tag with one-time pads assuming adversary is not always present, some pads will be secret!
Not for retail items, which must include basic item information. Perhaps for prox. cards, tickets, etc.?
Blocker Tag
Blocker simulates all (billions of) possible tag serial numbers!!
1,2,3, , 2023 pairs of sneakers and (reading fails)
?
00 01 10 11
000
001
010
011
100
101
110
111
In a nutshell
Tree-walking protocol for identifying tags recursively asks question:
What is your next bit?
Blocker tag system should protect privacy but still avoid blocking unpurchased items
Example:
Tags might carry a privacy bit Blocker blocks all identifiers with privacy bit on Items in supermarket have privacy bit off On checkout, leading bit is flipped from off to on
PIN required, as for kill operation
11
000
001
010
011
100
101
110
111
Polite blocking
We want reader to scan privacy zone when blocker is not present
Aim of blocker is to keep functionality active when desired by owner
But if reader attempts to scan when blocker is present, it will stall! Polite blocking: Blocker informs reader of its presence
Your humble servant requests that you not scan the privacy zone
Soft Blocking
[Juels and Brainard WPES 03]
External audit possible: Can detect if readers scanning privacy zone Advantages:
Soft blocker tag is an ordinary RFID tag Flexible policy:
Opt-in now possible e.g., Medical deblocker now possible
6123789035
time T
Stronger Property
Forward Security
Once the secret in the tag is stolen, all past activities can be traced by searching past logs. Forward security ensures that the latest memory in the tag does not give a hint to guess past outputs. So the past activities can be protected from tampering. secret information
output 2
time
output3
Tag A
output 4
Tampering!
Hide ID by encryption
so that only designated Reader can read it.
Hash Functions
Functionality
One-way (Preimage-free): hard to guess the input from the ouput
Contribution
Defined security requirements
Indistinguishability Forward security
Proposed scheme
Low-cost Security requirements are satisfied
Secret information is renewed using hash chain. Output of tag is changed every requests and random.
Future works
Reduce the computational cost of back-end server Low-cost hash function
Outline
1. Introduction (RFID System and RFID Privacy Problem) 2. Our Contribution
1. Stronger security model
Indistinguishability, forward security
3. Conclusion
Outline
1. Introduction (RFID System and RFID Privacy Problem) 2. Our Contribution
1. Stronger security model
Indistinguishability, forward security
3. Conclusion
Memory
si
G
Output
si +1
Overwrite
Tag
H G
ai
Server Operation
ai
DB
( ID,
s1
ID
Implementation Issues
Saving servers computation
Cash latest value si to reduce calculation cost, back-end server reduces calculation cost. Apply efficient computing method for hash chain [Coppersmith and Jakobsson02][Sella03]. Our scheme allows parallel computation on the server-side.
RFID lifetime
Using FRAM (100 million times) instead of simple memory, for example EPROM and RAM(hundred thousand times).
28bits
EPC manager
24bits
Object class
36bits
Serial number
Version
Manufacture code
Article classification
Serial number
Header
Back-end server
Operation
ai
1. Reader sends an extended-EPC to the ONS server. 2. ONS server resolves address of back-end server and responds to reader. 3. Reader sends extended-EPC to back-end server. 4. Back-end server resolves extended-EPC to originalEPC and returns it to reader. 5. Next, the basic protocol in our scheme is performed.
Conclusion
Defined security requirements
Indistinguishability Forward security
Proposed scheme
Low-cost Security requirements are satisfied
Secret information is renewed using hash chain. Output of tag is changed every requests and random.
Future works
Reduce the computational cost of back-end server Low-cost hash function
Summary
Define security requirements
Indistinguishability Forward security